HMAC

Results: 319



#Item
181HMAC / Hashing / Advantage / Pseudorandom function family / Function / Information theory / Random oracle / Cryptography / Message authentication codes / Cryptographic hash functions

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria August[removed]Abstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-13 02:56:37
182Message authentication codes / Cryptographic hash functions / HMAC / Internet protocols / HOTP / SHA-1 / MD5 / SHA-2 / Collision attack / Cryptography / Error detection and correction / Hashing

Attacks on SHA-1 Attacks on SHA-1 Initiative for Open AuTHentication

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:31:08
183HOTP / Computing / Message authentication codes / Cryptographic hash functions / One-time password / HMAC / Password / SHA-1 / Two-factor authentication / Cryptography / Internet protocols / Security

http://www.ietf.org/rfc/rfc4226.txt

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:26:04
184Message authentication codes / Cryptographic hash functions / Internet protocols / HMAC / HOTP / SHA-1 / Collision attack / Hash function / Wang Xiaoyun / Cryptography / Error detection and correction / Hashing

SHA-1 & HMAC OTP Frequently Asked Questions Recently, there has been considerable coverage in the press about an upcoming paper from Academics in China that describes an attack on SHA-1. OATH is providing this overview a

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:27:57
185Hashing / NIST hash function competition / MD5 / Hash function / HMAC / Cryptographic hash functions / Error detection and correction / Cryptography

SHA-3 Competition - Round 2: Official Comments-BMW

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:12:20
186Hashing / Preimage attack / HMAC / Hash function / Collision attack / NIST hash function competition / Cryptography / Cryptographic hash functions / Error detection and correction

Re: OFFICIAL COMMENT: LUX

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:14:50
187World Wide Web / OAuth / Twitter / HMAC / CURL / Authentication / Computing / Software / Cloud standards

Package ‘ROAuth’ July 2, 2014 Title R interface for OAuth Description This package provides an interface to the OAuth 1.0 specification, allowing users to authenticate via OAuth to the server of their choice. Version

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 10:19:59
188Security / Cryptographic hash functions / Hashing / Information society / Premier Election Solutions / SHA-1 / HMAC / Voting machine / Optical scan voting system / Politics / Error detection and correction / Electronic voting

Microsoft Word - Florida Dec 2007 Review Response final.doc

Add to Reading List

Source URL: election.dos.state.fl.us

Language: English - Date: 2008-03-19 09:20:28
189Architecture / Transport / Asphalt / Road construction / Concrete / Sieve analysis / Asphalt concrete / Asphalt plant / Road surface / Construction / Building materials / Pavements

SUPPLEMENTAL TEST PROCEDURES FOR HMAC AND EAC CITED IN: “Contractor Mix Design Guidelines for Asphalt Concrete” JANUARY[removed]

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2013-01-25 01:29:56
190Pavements / Architecture / Transport / Asphalt concrete / Road surface / Construction aggregate / Sieve analysis / Emulsion / Aggregate / Construction / Building materials / Concrete

HMAC TEST PROCEDURES CITED IN:

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-05-19 21:17:56
UPDATE